Use secure methods to boot a system and verify the integrity of the operating system and loading mechanisms. This can be accomplished with a Trusted Platform Module (TPM), which is a specialized chip on an endpoint device that stores specific encryption keys.
Discard any attack targeting one of your Assets that isn’t a Personnel or Service Provider. Gain 1 point and discard this card at the end of the round.
The CIAS was established at UTSA in June of 2001 as part of UTSA’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.